default search action
Transactions on Data Hiding and Multimedia Security, Volume 8, 2012
- Yun Q. Shi, Stefan Katzenbeisser:
Transactions on Data Hiding and Multimedia Security VIII - Special Issue on Pattern Recognition for IT Security. Lecture Notes in Computer Science 7228, Springer 2012, ISBN 978-3-642-31970-9 - Hisham Al-Assam, Ali J. Abboud, Harin Sellahewa, Sabah Jassim:
Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion. 1-18 - Andrey Makrushin, Tobias Scheidat, Claus Vielhauer:
Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features. 19-41 - Thomas Gloe:
Feature-Based Forensic Camera Model Identification. 42-62 - Sascha Zmudzinski, Martin Steinebach, Moazzam Butt:
Watermark Embedding Using Audio Fingerprinting. 63-79 - Christian Kraetzer, Jana Dittmann:
Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis. 80-101
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.